{"id":229,"date":"2008-03-25T09:58:14","date_gmt":"2008-03-25T17:58:14","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/03\/25\/happy-spring-break\/"},"modified":"2008-03-25T09:59:53","modified_gmt":"2008-03-25T17:59:53","slug":"happy-spring-break","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/25\/happy-spring-break\/","title":{"rendered":"Happy Spring Break!"},"content":{"rendered":"<p>Have a great spring break everyone!<\/p>\n<p>To readers of this blog:  Please expect low activity for a while. The University of Washington is on the quarter system, and our quarter just ended.  Everyone in the class is, of course, encouraged to still contribute articles to this blog.  And we&#8217;ll continue using this blog (or more sophisticated forum environments) in future courses.\u00a0 Stay tuned for more information \ud83d\ude42 .<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have a great spring break everyone! To readers of this blog: Please expect low activity for a while. The University of Washington is on the quarter system, and our quarter just ended. Everyone in the class is, of course, encouraged &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/25\/happy-spring-break\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,5],"tags":[],"class_list":["post-229","post","type-post","status-publish","format-standard","hentry","category-announcements","category-security-reviews"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}